We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then, we address the fact that not all participants in a trust-management system can be trusted to assist in such monitoring, and show how many integrity constraints can be monitored in a conservative manner so that trusted participants detect and report if the system enters a policy state from which evolution in unmonitored portions of the policy could lead to a constraint violation.
|Journal||ACM transactions on information and system security (TISSEC)|
|Publication status||Published - 2009|
- distributed system security
- Trust Management
- Access Control
Etalle, S., & Winsborough, W. H. (2009). Maintaining control while delegating trust: Integrity constraints in trust management. ACM transactions on information and system security (TISSEC), 13(1), 5:1-5:27. [10.1145/1609956.1609961]. https://doi.org/10.1145/1609956.1609961